Steganography Technique Applied in Text

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

VIRTU

AL
SECUR
ITY

HIDING DATA

HIDING DATA IN
NOTEPAD
BY
SYED UBAID ALI JAFRI

STEP -1 : Open command prompt "cmd.exe"

STEP -2: TYPE :


echo I Dont want this Message to be appear >Data.txt:Hidden.txt

echo - Command used to print data


I Dont Want this Message to be appear - Content of the File
> - Symbol used to Write the data content.
Data.txt - Write the content print by the Echo command in Data.txt

- There is a concatenation of a file

Hidden.txt - Hide the data in Hidden.txt

Retrieving the Hidden Content of a file

To view the hidden content of the file Type:


more < data.txt:Hidden.txt
More : Command used to read the content of the file
<
:

: Write the Data in the More cache memory


Concate the file

Hidden.txt : This is a password file if we forget this filename then we will not be
able to retrieve it easily.

Hiding Other File Types:


TYPE [data to be hidden]>[target file]:[Alternate stream]
For example:
TYPE Passwords.doc>My_Pic.jpg:MyPasswords.doc will fork My_Pic.jpg with an ADS
MyPasswords.doc.

Hiding .exe File :


Even exe file can be hidden and *directly* accessed through ADS. For example :
C:\>TYPE Virus>test.txt:MyVirus.exe
C:\>START .\test.txt:MyVirus.exe

(2) Removing attached ADS


Now, suppose you want to delete the alternate data streams from a file without deleting the
file itself. So, what you do is you copy the original contents to another file and then delete
the original file, which would also delete all ADS. For example :

C:\> REN test.txt temp.txt


C:\> TYPE temp.txt > test.txt
C:\> DEL temp.txt
To View what ADS stream is being used with the text file TYPE DIR /R in
the command prompt
For example:

"DIR /R" command in vista to show Alternate Data Streams

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy